needs diagram and about 750-900 words
Therall Industries
Therall Industries Headquarters
Executive Suite
Accounting
Reception
R & D
Engineering
Guest Offices
Storage
Telecom Room
Brick Firewall
Therall Industries Remote
Production 2
Reception
Engineering
Production 1
Telecom Room
Therall
2
Dr.Steve Gardner, SP2020, April 22, 2020
BONUS QUESTION SP20 MIS3613 DATA COMMUNICATION AND COMPUTER NETWORKS
You are an electrical engineer and the IT Director of Therall Industries, a small company that makes a very intricate high technology device, the metapolar refractive pilfrometer for Rockwell Industries Turboencabulator. If you wish to know more about the device, you may watch the video at
.
Your company works out of two small locations in two different cities. The two offices, almost identical on the outside to be easily recognizable as a Therall facility (an icon featuring the buildings is on the company logo), are approximately 600 feet long and 400 feet wide. The first location, Headquarters, houses Executive Management and Research and Development Engineering. The second, Remote, is where other engineering and production takes place.
Therall Industries |
Your boss, Tom Frantype, has asked you to, 1) develop an internal network leading to a secure wired communication system between the two offices, and, 2) install a wireless network in each facility.
The facility layouts are available on the accompanying Powerpoint Presentation and reproduced above.
Here are the exact tasks.
1. Discuss your intrabuilding networks. At Headquarters, you will need:
a. Two hosts in the Executive offices
b. Four hosts in R&D
c. One host in Reception
d. Four hosts in Guest Offices
e. Two hosts in Accounting
f. VoIP service to each area
Layout your hosts on the diagram, being sure to discuss what type and grade of structured cabling you will use, where the runs will map, what jacks you will use and where they will be located, and the physical and logical topology to be used. Also discuss your building connection to the ISP through your telecom room, including type of patch panels and what your demarc looks like and where it is connected. (10 Points)
2. At Therall Remote, you will need:
a. Sixteen hosts in Engineering
b. Four hosts in each production area
c. One host in Reception
d. POTS service throughout
Layout your hosts on the diagram, being sure to discuss what type and grade of structured cabling you will use, where the runs will map, what jacks you will use and where they will be located, and the physical and logical topology to be used. Also discuss your building connection to the ISP through your telecom room, including type of patch panels and what your demarc looks like and where it is connected. (10 Points)
3. The secure communications channel should allow the employees of both offices to communicate securely with each other and the servers located at Headquarters. It should also allow employees to work remotely using the network at either Headquarters or Remote. What is this secure network, how it is formed, what protocol(s)does it use, etc? Convince Tom Frantype that you can secure it by explaining how it works. (10 points).
4. The WAN communication channel from both ISPs to the facilities is a T3. Explain how a T3 WAN channel works, what the available bandwidth is, what sort of communication protocol it uses, how it might communicate over long distances (Headquarters is in Houston, Remote is in Ada), and how it is terminated at the demarc. (10 points).
5. Now it is time to setup the wireless network in each facility. Explain how you will set it up, what type of communication device you will use, what band it operates in, where the device(s) will be positioned, and how fast the connection will probably be and why. Don’t forget your most important wireless connection will be at Headquarters between the receptionist and the CEO in the Executive Suite. To make the CEO happy, that connection needs to be fast and certain to make. (10 points).
6. At Remote, there are 6 dapoplar presserstops in Production 1, and 7 in Production 2. These machines are controlled from a central control booth in each room. The machines are monitored via a PAN in each room. Explain how this PAN works, including the communication method, the frequency, the range of the devices, and anything else Tom Frantype may ask about these smaller networks. Try to anticipate his questions. (10 points).
7. Oh no! Interbuilding comms are down and R&D in Headquarters cannot talk to Engineering at Remote. Explain the steps you would go through to troubleshoot this problem. (10 points).
8. While one of your engineers was on a chat line discussing one of the dapoplar presserstops that was acting up with a representative from Shadrach (the company that makes the machine), his monitor went blank. After a few moments, a message popped up that said, “If you want your data back, you must send a certified check for £500,000 to Cayman National Bank, Peter A. Tomkins Building, 200 Elgin Ave, George Town KY1-1102, Cayman Islands”. No matter how he tried, the engineer was unable to access the secure data folder on the server where the Therall company proprietary manufacturing data is kept. What has happened? Is there a way to fix this? (10 Points).
9. Wow, you have done a great job on your system! In fact, Tom (was MISTER Frantype, but now you are on a first name basis) was so impressed he gave you a raise and a part of the profit-sharing bonus pool. This almost doubled your salary. Last Friday night when you were at a barbeque at Tom and Marie’s house in the Woodlands outside of Dallas, Tom told you, “You know, I have heard a lot about this networking thing but I really don’t understand how a computer forms a message, asks for a webpage and gets the correct one, or really anything about it. It all seems like magic to me. I said something to Fred over in R&D and he said, ‘It’s simple, it’s all about the OSI model and encapsulation and de-encapsulation. That explains everything.’ I must admit I felt a bit foolish asking anymore because Fred said it was so simple. Can you explain to me what he was talking about? What does he mean, ‘Seven layers?’, and ‘Headers and Footers’? And then he said something about another model, the TCP/IP? Can you help me here?”
It appears staying in Frantype’s good graces is going to require you to explain what the two models are, what they do, and how they work. You should do that by, 1) explaining the OSI model, and, 2) explaining the TCP/IP model by helping him understand how a web page is requested and received, including protocols, etc. Your new salary, in fact, your entire job, may depend on this. Good luck. (10 points).
10. Please ensure your submission is neat and easily readable. Do your best work. (10 points)
Thank you.
If you want a full explanation of the Turboencabulator, including history, uses, and companies that employ it, visit
or reference the Wikipedia article on this amazing invention.
NETWORKING SYSTEMS 1
NETWORKING SYSTEMS 5
Networking System
Sarju Thapa
Dr. Stephen Gardner
East Central University
Abstract
In this report, the planning to design the network will be discussed and demonstrated in detail. The planning to design the network layout will be made according to the scenario given in the requirements. The plan will be implemented by the evaluation of the aspects that are important to design the network and other necessary things to design and implement the network. After implementing the network, the network will be tested by secure communication, WAN communication Channel, Wireless network, and PAN network. The troubleshooting of the network will also be discussed and elaborated in detail. The protocols used in this network will also be taken into consideration.
Introduction
Designing a network is not a simple task for someone. There are different phases to design the network. Each phase has a very important role to design the network. The first phase is to collect all the requirements to design the network. The second phase is to evaluate the requirements to make sure that either requirement is enough to design the network or not. After evaluating the requirements, the third phase is to implement all the aspects that are gathered in requirements. The fourth and last phase after implementing the network design is to optimize the network by performance.
Network Layout
The physical arrangement of the network is called network layout. The network layout of the given is scenario is shown below:
Diagram created using CISCO PACKET TRACER 7.3.0
Demonstration
This network consists of two different places one place is headquarter which is the main point of this network and another place is Therall which is the working point of this network.
Headquarter
In headquarter, the Executive office, R&D, Reception, Guest office, and accounting office’s host are connected with one switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C (Actually, RJ-45 is the more common term) jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network. (I think that what you have in your diagram is a bus-star hybrid. The switch is the bus, the individual cables to the hosts are the star)
Thrall
In Thrall Remote, the Engineering area, production area, and reception area’s host are connected with the switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network.
For both 1 and 2: type of cable, where do you map the runs and place the jacks (I gave you a building layout), and what is in the telecom room, e.g., server, patch panel, demarc, router, etc?
7 points each.
Secure Communication
Communication through this network is secure because it is a private network and has less vulnerability. An unauthorized person cannot reach this network. The transmission control protocol is used in this network
Sarju, this is not secure from building to building (server to server, or really, network to network) or from an employee home to the server (host to network). A man in the middle attack with a packet sniffer would eat your lunch. You are still thinking like a computer person and not like a network person. While what you say is true, it really doesn’t secure a network. The only way to really do what I asked is with a VPN using PPP and either PPtP or L2TP as the security wrapper. 5 points.
T3 WAN channel helps to transmit data over the network is a secure and reliable way. The transmission of data in this channel is fast and accurate. The bandwidth of this network is 1000 Mbps. For long-distance, TCP/IP protocol is used.
What is a T3 WAN provide for bandwidth and speed? How is it formed and terminated. In other words, what is a T3 and how does it work. And, it is not secure.
Wireless network
The wireless network is set up by radio signal frequency. It used this frequency to connect two different devices. It is very easy to set up and configure in the network. It is fast and easy to understand and establish. Sarju, this was supposed to be about the wireless networks? Devices, placement, bandwidth, discussion of 802.11, etc. I think you missed something here.
PAN
PAN stands for Personal area network. PAN is used in personal devices and is normally connected with the higher-level network it is normally used to provide communication between devices like computers, mobile, and laptop. The range of the PAN network is very small. The range is10 meters. Its frequency for Bluetooth is between 2.4 GHz to 2.48 GHz.
You didn’t really explain your network…just told me what a PAN is. I would have liked you to discuss ICS with DCS and maybe PLCs. A quick bite of SCADA would be good, too.
Troubleshooting
It is a very complex task to troubleshoot the network because sometimes the fault is a miner and does not found easily. In the given scenario, the network will be troubleshot by check the wired connection and by checking the router configuration.
Where would you start? Probably at the demarcs and work in. If that was okay, you should call the ISP. Need more detail. 4 points.
OSI model
OSI stands for open system interconnection. There are seven layers in the OSI model. Each layer is used for a specific task. The 7 layers of OSI are described below:
· Application layer
· Presentation layer
· Session layer
· Transport layer
· Network layer
· Datalink layer
· Physical layer
What about the TCP/IP Model and encapsulation /De-encapsulation? What is that all about? And what about using the example of a web page to explain the process? 2 points.
Overall, a lot more detail is needed…31/100
Conclusion
In this report, the planning to design the network layout according to the given scenario is discussed and demonstrated in detail. Different phases to design the network are also discussed in detail. Some optimization of the network by testing the network are also discussed. We also implement the project plan to design this network. We also studied and implement the different cases on this network.
Sources:
J. K. a. K. Ross. “Computer Networking: A Top-Down Approach Using the Internet” Addison-Wesley, 2013.
L.L. Peterson and B.S. Davie. “ Computer Networks a system approach, Morgan Kaufmann, 2012.
B.A. Forouzan, Data Communications and Networking”, 4rd Edition, McGraw Hill, 2007.
A.S. Tanenbaum. “Computer Networks” 4th Edition, Prentice Hall: 2003.